Monday, February 17, 2020

Sickle Cell Disease Research Paper Example | Topics and Well Written Essays - 1250 words

Sickle Cell Disease - Research Paper Example Due to the abnormal haemoglobin formation, this oxygen delivery is affected. The red blood cells also lose their normal functional capacity and acquire a sickle shape and this leads to anaemia in the patient. These individuals are also more prone to infections (Bloom 1995; Govan et al 1995; Ganong 2005). The image above shows the difference between the normal shaped red blood cells and the red blood cells of sickle cell disease (National Heart Lung and Blood Institute 2011). Each parent contributes to the genetic makeup of an individual. Half of the genes are inherited from mother and the other half from father. Some traits are completely governed by the type of genes present in the body like colour of eyes and height while others may be influenced by the environment like athletic abilities. Although the parents make an equal contribution of genes but their effect is not always the same. Some genes are dominant and some are recessive. The dominant gene produces its effects in all cas es while the recessive gene has to be present in a pair to produce the desired effects. HbS which is the gene implicated in the causation of sickle cell disease is a recessive gene. ... ase If one parent is diseased and the other is normal If both the parents are carriers of the defective gene If one parent is carrier and the other is normal Both the parents are neither carriers nor do they suffer from the disease The chance of transmitting the disease is 100% in the case when both the parents of a child suffer from sickle cell disease. If one parent is diseased and the other is carrier of sickle cell trait, the chance of developing disease is reduced to 50% and if one parent is diseased and the other is normal then there is 0% chance of disease development however it will produce sickle cell traits in the children (Bloom 1995). The figure above shows the â€Å"Genetic pedigree† of sickle cell disease.( Shiverdecker 2005) The clinical manifestations of sickle cell disease vary with the age. The major complication associated with the disease is chronic low levels of haemoglobin while some other complications include bacterial infection, splenic sequestration w hile stroke, renal disease, pulmonary hypertension, leg ulcers depict the organ damage in long standing disease. The infection from bacteria results from the reduced functioning of the spleen or asplenia. Asplenia occurs due to the continuous destruction of sickle shaped red blood cells in the spleen which results in the affecting the normal functional capacity of the organ. Hence, spleen is the first organ to be damaged. Splenic sequestration is characterized by the enlargement of the organ and decreased Hb levels along with thrombocytopenia present occasionally. This has been a common cause of death due to sudden circulatory collapse. Acute chest syndrome affect almost 50% of the patients and it is the second leading cause of emergency. Adults are generally more affected. In acute chest syndrome,

Monday, February 3, 2020

Computer Science-Information System Essay Example | Topics and Well Written Essays - 750 words

Computer Science-Information System - Essay Example in the case of industrial espionage or actions on the competitors' side) or inadvertent. Anyway, uncontrolled distribution of private information (especially about customers, e.g. card numbers, addresses, orders, business transactions, etc.) will result in withdrawal of customers and business partners, numerous lawsuits, and reducing revenues and profits. Therefore, often companies try to protect own information systems at the expense of employees privacy. This is a part of computer crime prevention measures with usage of specialized encrypting and authentication hardware and software, anti-malware programs such as Internet filters, firewalls, antiviruses, intrusion detection systems, etc. In some cases company's prevention measures contain monitoring for employee's communications from office workstations including e-mail control. Here, it is necessary to note that federal laws permit employers to monitor e-mail sent and received by employees. However, most companies maintain own privacy policies, trying to balance between privacy rights and security of business information. Sometimes corporate privacy policies allow employees and customers to access data about them and let them decide how that data can be used. This helps to avoid possible misunderstandings between company, employees, and customers. 2. 2. It is obvious that working conditions in IT Company must be designed to prevent computer crimes and simultaneously to avoid negative ethical consequences of prevention procedures. In fact, there is need to balance between some restrictions of Company's information flows and some rights to privacy, and also some rights to know; see Freeman & Graham Peace (2005), and also Tynan (2005). There are two main strategies to achieve such balance which often combined in practice. First strategy is "the way of prohibitions", namely not to distribute business information and information about technical processes, innovations, features of source codes, information from Company's internal databases, not to delete or corrupt information without clear instructions, etc. These restrictions can be easy formulated, described and then realized by technical means. Also, there are certain possibilities to reveal and investigate almost all cases of violation such Company's rules. These violations can be classified as computer crimes and often related to industrial espionage and information "wars" between competing companies. It is necessary to note that employee must have access to certain parts of Company's data to perform work tasks; therefore, information cannot be concealed at all. Alternative strategy is "the way of responsibility and obligations" or using corporate ethic rules. These rules determine generally accepted and discouraged activities within IT Company and between organizations. Employees define acceptable practices more strictly than just refraining from committing computer crimes; they also consider the effects of their activities on other people and organizations. Therefore, it is necessary to promote ethically responsible use of information systems on the base of developed codes of ethics, e.g. AITP code of ethics. This code of ethics is a set of obligations to management, fellows, society, employer, and country. For each area of obligation, standards of conduct describe the specific duties and